Kassie is designing a deployment plan for employee laptops for a small company. All employee laptops will use Windows OS. What protocol should she enable to ensure that all employee laptops can be remotely accessed securely by the network administrator?