Leveraging Log Instructions in Log-based Anomaly Detection