tcpdump, and thus WinDump (which is a port of the tcpdump code to Windows), doesn't have a protocol column per se. Here's some tcpdump output from my machine:
11:11:52.409447 IP 192.168.42.69.45779 > broadcasthost.ssdp: UDP, length 378
11:11:52.717007 IP 192.168.42.69.45779 > broadcasthost.ssdp: UDP, length 431
11:11:52.921460 IP 192.168.42.69.45779 > broadcasthost.ssdp: UDP, length 381
11:11:53.068266 IP 192.168.42.66.49778 > my.isp.net.domain: 38666+ PTR? 69.42.168.192.in-addr.arpa. (44)
11:11:53.123356 ARP, Request who-has 192.168.42.66 (Broadcast) tell 192.168.42.1, length 46
11:11:53.123383 ARP, Reply 192.168.42.66 is-at ac:bc:32:7e:1a:69 (oui Unknown), length 28
11:11:53.128804 IP my.isp.net.domain > 192.168.42.66.49778: 38666 NXDomain* 0/1/0 (93)
11:11:53.129931 IP 192.168.42.66.52809 > my.isp.net.domain: 17704+ PTR? 255.255.255.255.in-addr.arpa. (46)
11:11:53.161878 IP my.isp.net.domain > 192.168.42.66.52809: 17704* 0/1/0 (109)
The first three lines are UDP packets - they're probably SSDP packets, as they're going to the standard port for SSDP (from the ".ssdp" in the destination endpoint), but tcpdump doesn't try to dissect SSDP.
The rest are DNS packets, but there's nothing saying "DNS" there.
So there really aren't protocol columns to compare between tcpdump/WinDump and Wireshark dissections.
Both of them look at the raw packet data to try to determine the protocols being used, and both of them do so differently and can get different results, even when looking at the exact same capture file. Wireshark does a lot more work than tcpdump/WinDump, so it's more likely, in general, to determine the correct top-level protocol.