Voretaq7 has provided a good answer to your specific question (AD does not distinguish), but I do want to add that what you want is possible, depending on how much extra work you want to put in.
The methods to do this involve giving your help desk users specific, delegated permissions to perform functions with a service account that is higher-privileged than they are, without logging in directly as this service account.
All of them also involve being very careful with exception handling and allowed inputs so that your users can't provide unexpected input that exploits the higher privileges of the service account.
You could, for instance:
- Have users log into a web page with a bunch of pre-cooked options like 'move a user' or 'disable an account'. Their input can then go off to your server and kick off an action by the service account (please don't include the function in the webpage code such that somebody could e.g. harvest the service account credentials by using 'view source'.)
- Use powershell session configurations. These allow you to delegate one user or group rights to invoke specific commands as another user or group (much like Linux root delegation below). Move-ADObject is the cmdlet you're interested in here, again be careful the account you let them invoke as doesn't have excessive privileges (i.e. definitely not a domain admin because you don't want them moving your DC's around randomly!)
For reference, I believe linux has something similar to this with users having limited su privileges to do specific things with specific commands (I found several resources with a google for 'root delegation').