Using DANE or so (RRs CAA/TLSA) can help in this case (when provider route traffic to specific port), but does not solve the problem completely.
If DNS record will be compromised, then hacker can setup "correct" TLSA/CAA record to trust his fake certificate.
As result, problem can be solved, if we will have reliable DNS subsystem, where is impossible to compromise DNS provider or infrastructure.
I think, emerDNS can be used in such critical application: https://emercoin.com/en/documentation/blockchain-services/em...