A company's serverless application, utilizing Amazon API Gateway and AWS Lambda, has experienced a surge in traffic due to botnet-induced fraudulent requests. What measures should a solutions architect implement to mitigate unauthorized access? (Select two strategies.)