Two-factor authentication using an Authenticator application, email or security keys, cell phones (NFC, BLE), and other built-in authenticators such as fingerprint or facial recognition is an additional security measure to protect accounts from unauthorized access.
The setup process is straight forward and explained in detail here.