Securing Sensitive Information through Database Encryption Techniques