Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability