An attacker can use the unrestricted LDAP queries to determine configuration entries
Upgrade to the latest versions.