Optimizing the Privacy-Utility Balance using Synthetic Data and Configurable Perturbation Pipelines