There are few apps, which can be exploited now or have been previously and that was either disclosed or not, some of them are required to be configured for LDAP, and the injection doesnt always require user to be authenticated. These apps are any apps which are using LDAP, but highly possibly vulnerable ones are:
Openfiler - very often configured with LDAP
Horde/Imp - same as openfiler
Windows Active Directory apps using LDAP (actually, the native windows library doesnt do any checks, so you can pass lot's of rubbish via SDK to the windows server causing very many different responses and errors - including 2008 R2 and Server 2012).
Google Apps
Generally, you are very likely to actually find some exploitable bugs with LDAP, because many apps are not working with it by default, so admins configure LDAP themselves in a very insecure ways, that with the simple injection you can either get all users, but also change password of the admin. Since many apps are not tested with LDAP by default, it's very likely, that once you will enable LDAP, you will find many issues.