A network administrator is configuring a VPN setup to secure communications between their corporate office and remote office. During this setup, which protocol would be primarily responsible for automating the negotiation of protocols and methods for encryption and authentication in a VPN?
Internet Key Exchange (IKE)
Secure Socket Layer (SSL)
Secure Shell (SSH)
Layer 2 Tunneling Protocol (L2TP)