Make sure you remove the Everyone group from the list of groups and users who are assigned share permissions for the folder.
Note: You can use an existing user or create a user specifically to serve as the network impersonation user. You must create a user account to use solely for network impersonation. The user account created for network impersonation requires the Act as Part of Operating System permission.