Privacy or Utility? How to Preserve Both in Outlier Analysis