What is the purpose of a two-way radio in security operations, and what are the basic protocols for its use?