The Role of Protocol Analysis in Cybersecurity: Closing the Gap on Undetected Data Breaches