Choose one of the LDAP security configurations from the available security configurations described in
Security configuration models, and then apply that LDAP security configuration model by following the instructions in
Choosing and applying a security configuration.