What is the idiomatic way to implement auth protection? - TanStack