What is the tool employed by John to gather information from the IDAP service in this case? As a professional hacker he targeted a company that utilizes LDAP to access dispersed directory services. He utilized an automated tool to query the IDAP service anonymously for sensitive information such as usernames. addresses, departmental information, and server names in order to conduct further attacks on the target company