In field level encryption, each sensitive field is encrypted using a specific encryption key. This means that even if an attacker gains access to the database, the encrypted fields will remain protected. Decryption is only possible with the corresponding decryption key, which should be securely managed.