Recently, your security team has noticed an increase in email spoofing attempts. To mitigate this, you're tasked with implementing various email authentication mechanisms. Which combination of protocols is MOST effective for preventing email spoofing?