ipsec can be implemented in a hotspot

Since it appeared as such a manual to circumvent the HOTSPOT, I’m worried I wonder if you can implement IPSEC.
I would appreciate if you can tell me

I’m a novice in the use of IPSEC

THANK YOU. . .