Sarah just made a purchase on an online shopping site (such as amazon) and completed the checkout process by paying with her credit card. Which protocol was most likely used for the transmission of her information