Two-Factor Authentication

What is two-step authentication and how to use it?