Configuring secure protocols