John, a cybersecurity beginner, was asked to implement a strategy for protecting user passwords at his organization. He decided to hash the passwords. However, a colleague suggested he should also 'salt' the passwords. What does the term 'salting' refer to in this context?"