My contribution is not a perfect solution but merely another layer of protection.
If you have a decent domain setup, there is such a thing as having a GROUP IDENTIFIER that can then be granted to various users. Your domain admin can make one of these for you. I should note that this method was approved by the U.S. Navy as a way to contribute to the protection of files requiring a certain level of isolation.
In Windows security, there is a thing called an Access Control List that is named according to its function: It is a list of controls (rules) to allow access to something. Windows allows you to put such lists on files. The entries of the list (called an ACL) appear in a given order, which is significant, in that "first match wins." So... the LAST entry in the ACL for the folder containing the files you want to really protect should have an explicit DENY ALL permission assigned to ALL USERS. But the 2nd-to-last ACL entry should be one for a GROUP identifier that will be granted only to those users intended to be users to your DB. The first ACL entry usually grants full access to SYSTEM and you shouldn't play with that. There are also ACLs commonly used to grant operational rights for the purposes of making a backup copy or other file-level maintenance things. Again, don't mess with the backup operator's rights. Or the administrator's rights.
Make a list of people who SHOULD have access to this DB. Make them members of the group implied by the group identifier mentioned earlier. Making someone a member of the group in effect grants them the identifier. It is like adding a specialized key to a key ring. Once you do this, the significant entries are last and 2nd last.
The steps whereby the file system grants a user process access to a file includes "access arbitration." In this case, the test will be like a bunch of IF THEN ELSEIF statements: Are you SYSTEM? If so, grant access rights according to the SYSTEM ACL. After some other tests, ... Are you a member of DB Users Group? If so, grant access rights according to the DB Users Group ACL. Are you a member of the "All Users" group? (Yes, everyone is...) If so, grant access rights according to the All Users ACL. Which happens to be DENY ALL. With a DENY ALL in place, nobody except the group members and system staff will touch those files.
To double the protection, do the same for the files in the folder containing the DB. (I.e. apply those ACLs to the parent directory, but allow the permissions to propagate to child folders and files.) This means that random browsers CANNOT SEE the files. They would know that the parent folder exists but would be unable to know what was in it, because nobody could read the folder.
This SHOULD NOT rule out use of other methods as shown by Colin (Isladogs), theDBguy, Isaac, and CJ_London. Many of these methods can work together. This is just one more way to tighten things up.