A brief description has been given regarding the probable solution to the problem.The outcome expected if this model is implemented is the check of additional security. The first step would be to break through the first level and try to access the database unauthorizedly. This would determine the whether the second level of security would be able to block this unauthorized access. Once this is successful, then our next step would be to try to pick out the loop-holes of LDAP and try to find the possible areas where it might be susceptible to any outside attack.If possible,we would try to give the necessary recommendations for these too.