A security company is generating passcodes to access lockers across a country using an algorithm G. This approach primarily aims to enhance:
a) Access control
b) Encryption protocols
c) Authentication mechanisms
d) Intrusion detection systems