Watch this video on YouTube
Olivia, a system administrator, is noticing significant traffic directed to port 389 on one of the company's servers. What service is typically associated with this port and what potential security risks should Olivia be aware of?