A company needs to implement the most secure wireless encryption protocol on their new enterprise wireless network. The IT department must choose an encryption method that provides robust security by employing advanced encryption methods, while also allowing for central authentication of users against an enterprise directory service. Which of the following encryption protocols should be configured on the access points to meet the company's requirements?
WPA2 Enterprise with TKIP
WPA Personal with AES
WPA2 Enterprise with AES
Wired Equivalent Privacy (WEP)