Emma, who works in IT security, notices a security problem while sending important files. Some sensitive information, like employee usernames and passwords, is being sent without protection, making it easier for hackers to hijack sessions. To fix this, Emma sets up a system that sends data in a secure way using encryption and digital certificates. Which protocol is Emma using to make this happen?