So it's not the program that is authenticated. The system simply makes sure that any program accessing that particularly sensitive data is really controlled by the logged in user.
This is entirely separate from protections for other files that may or may not be encrypted.