You are an information system auditor of HDA Inc. You are auditing the controls in place to address SQL injection vulnerabilities. In this context, which of the following options would be the most effective control for mitigating SQL injection vulnerabilities?