In your role as a cloud security expert, you are assessing a cloud storage solution that utilizes iSCSI for block-level storage. Which critical security feature is inherently lacking in the iSCSI protocol and must be implemented through additional means?