Quoting the documentation:
When you see something suspicious, right-click on the item and select Path To GC Roots > exclude weak references. This opens a new tab that traces the references to that object which is causing the alleged leak.
You may also be interested in Patrick Duboy's Google I|O 2011 presentation on this topic. Here are the slides and the video.