Olivia, a cloud security engineer, introduces a method to enhance the security of the cloud resources utilized by her organization. This approach, by default, considers any user attempting to access the network as unauthenticated and scrutinizes each incoming connection before granting access to the network. Olivia has also implemented specific conditions ensuring that employees can only access the resources essential for their designated roles. What is the technique implemented by Olivia to safeguard cloud resources?