Data to Defense: The Role of Curation in Customizing LLMs Against Jailbreaking Attacks