Who Stole Your Data? A Method for Detecting Unauthorized RAG Theft