Olivia, a cybersecurity analyst, is tasked with enhancing the security of an LDAP service to safeguard it against anonymous queries. Olivia's mission involves identifying the specific protocol that is employed to secure the LDAP service against unauthorized and anonymous access. What protocol does Olivia need to identify and implement to enhance the security of the LDAP service?