Protecting High-Value Targets: The Role of Trained Personnel in Security Protocols