Keith is concerned about the frequency of SQL injection attacks against his organization's web applications. Which countermeasure is the best defense Keith can implement against SQL injection?