The port that connects to the AP should be configured as a trunk port and you should allow VLAN 1, VLAN 2, and whatever VLAN your AP is using for management (if it’s not VLAN 1). There really isn’t a way to restrict a VLAN to just voice traffic, it all depends what devices you permit to connect to that VLAN/SSID (you technically could use access-lists, but it’s not pretty). What are you trying to achieve?
With regards to DHCP, the devices connecting to the SSID on VLAN 1 really shouldn’t have a problem if the server is in the same VLAN. For VLAN 2 you need to configure a DHCP relay on the Layer 3 interface, the ‘vlan’ interface, on the switch - in IOS this is the ‘ip helper-address’.