A network administrator is setting up a new centralized authentication system for the company's multi-vendor network infrastructure. Security policies require individual accountability and the ability to implement command authorization based on roles. Which authentication protocol would BEST meet these requirements?
Kerberos
Remote Authentication Dial-In User Service (RADIUS)
Terminal Access Controller Access-Control System Plus (TACACS+)
Lightweight Directory Access Protocol (LDAP)