A network administrator needs to secure the connection to a mission-critical database server that communicates over its standard network port. While the software supports various methods of encryption, which configuration would directly apply the most appropriate layer of security for the database's native communication protocol?
Change the database service to a non-standard port to avoid detection.
Configure an IPSec VPN for all traffic destined for the database server.
Implement SSL/TLS encryption on the database's standard network port.
Establish an SSH tunnel to encapsulate database traffic.