Because these tools follow the unix philosophy of building single use tools. There are a wide variety of authentication measures that can be composed with databases to secure them. There is really no need to build the authentication into the database itself and it fact doing so would violate a don't repeat yourself ethos.