In his attempt to exploit an organization's LDAP service for sensitive information, Alex, a skilled hacker, utilized an automated tool to anonymously query the LDAP service. What is the tool employed by John in this scenario to extract details such as usernames, addresses, departmental information, and server names from the LDAP service?