A network administrator is setting up a new centralized authentication system for the company's multi-vendor network infrastructure. Security policies require individual accountability and the ability to implement command authorization based on roles. Which authentication protocol would BEST meet these requirements?
Lightweight Directory Access Protocol (LDAP)
Kerberos
Remote Authentication Dial-In User Service (RADIUS)
Terminal Access Controller Access-Control System Plus (TACACS+)