Guided Reasoning in LLM-Driven Penetration Testing Using Structured Attack Trees