While evaluating your organization's wireless network, you discovered that its security measures are inadequate. The network relies on an outdated encryption protocol that was originally designed to imitate wired encryption. Which protocol is being used in your organization's wireless network?