Imagine this:
- You have the domain xyz.com validated and bound to your ACME account.
- On the domain there is privacy protection active - which means, usually all the domains with this feature active on the same registry (e.g. GoDaddy.com) have thereby the same contact on the domain's whois.
- Someday you decide you dont want to renew this domain or miss the expiration date and the followup grace period(s) to renew it.
- Someone new registers this domain, enableds privacy protection.
In such a bound scenario, this person would now be unable to use Letsencrypt for this domain name, because its bound to your ACME account.
This person would now have to send documents etc. to ACME. And they need to check them, need to get in touch with you so you have the chance to react (could be a fraud in the end). This would cause a ton of work for everyone involved. The new domain owner, letsencrypt - and - possibly you (if its really a fraud attempt). How could this effort be justified for a free service? Meanwhile - the new legal owner - would be still unable to use Letsencrypt to get a certificate, all because of a missing revalidation - while there are options existing, that you don't even have to do this validation manually (see below).
This would create a massive chaos. Lets encrypt is there to enable relatively simple creation of certificates, but that doesnt mean validation-free. Whenever ordering a certificate, a validation has to be made. You can make the thing a lot easier, for example by using CNames for all your subdomains, even using CNames for secondary domains pointing to your primary dns zone to only change record(s) in one place rather than x places, and you can even automate the process by using APIs from your dns zone management service (e.g. Cloudflare), combine it with the ACME api - and automate the whole process from changing the records to fetching the certificate - and , if your infrastructure allows - even replacing the certificates locally.
And there are even great freeware GUI / Cli that you can use for that, once setup, they do the renewing upon your behalf, and some of them can even also replace the certs locally. Just make sure to use respectable / checked client before you feed it with access credentials for all the services.
Me personally, I use the REST API from my DNS Zone Management Service and the ACME Rest API, to automatically renew all certificates, automatically changing the IIS domain bindings, adding the corresponding certs to each employee computer's cert store - updating the thumbprints on the database (for second layer client validation) - in the end, just a couple of hundreds of lines of relatively simple code.
A client that often gets suggested (commandline) is CERTBot. A GUI client I used back in the past: CertifyTheWeb. But its been a while since I used those, so please research (again) before using.