An organization is implementing a protocol to secure its communications between web servers and clients. They require a solution that provides encryption, authentication, and integrity. Which of the following will BEST meet these requirements?
Secure Shell (SSH)
Privacy Enhanced Mail (PEM) files
Transport Layer Security (TLS)
Internet Protocol Security (IPsec)