Can Sensitive Information Be Deleted From LLMs? Objectives for Defending Against Extraction Attacks