There is no consensus if it is better to DROP or to REJECT but:
A. DROP makes your router a blackhole and sender terminates connection after many retries as there is no response.
B. REJECT generates outgoing data stream but fools sender that there is no host if the sender cares about it and stops sending data.
If attacker is just sending constant stream of 53-type packets with false src field then your router sends packet back to the router which is the real attack destination so DROP seems to be better.
To block LAN users from asking external DNS servers:
A. your DHCP server should point users to router as DNS server
B. router’s DNS should be configured: http://wiki.mikrotik.com/wiki/Manual:IP/DNS
C. Firewall should block 53-types packetes excluding router as source (assuming 192.168.88.1 as it’s address)
@coyhl:
A. You assume that requests are going only from ether1-LAN interface and do not care about other ones so you need to repeat rules for each interface.
B. My rules blocks each device except router…just outgoing interface.
C. Yes, I assume that requests are NATed to 192.168.88.1 as source…this should be tuned but it is just idea not full working code.