A fintech startup operates two internal microservices, both exposed as REST APIs using Amazon API Gateway within the same Virtual Private Cloud (VPC). The first API, called ExecuteTrade, needs to verify account balances by calling the second API, called ValidateBalance, before processing any trades. Recently, engineers observed in the VPC flow logs that traffic from ExecuteTrade to ValidateBalance is routing over the public internet instead of remaining within the private VPC network. The team wants to ensure this internal communication remains secure and local, with minimal impact on the existing codebase. What is the most effective solution to achieve this?