LDAP simple binds that are not protected by SSL/TLS are very insecure, as it involves sending username and password credentials in clear-text over the network.
LDAP simple binds are acceptable only over SSL/TLS/LDAPS.
All you have to do to enable LDAPS on an Active Directory domain controller is install a suitable certificate with private key on the AD domain controller:
https://support.microsoft.com/en-us/help/321051/how-to-enable-ldap-over-ssl-with-a-third-party-certification-authority
Be sure and read the requirements section of the article above to see what constitutes an acceptable certificate.
Once you've installed an acceptable certificate on the domain controller, Active Directory will automatically sense its presence and enable LDAPS over port 636.
You may source the certificate from any Certification Authority you wish, as long as it is trusted by all parties who will participate in the communication. It can be an existing AD-integrated PKI, or it can be a non-Microsoft CA on your corporate network, or it may even be a public, globally-trusted CA like Godaddy, Symantec, etc., as long as it is capable of producing a certificate that meets the requirements:
- The LDAPS certificate is located in the Local Computer's Personal certificate store (programmatically known as the computer's MY certificate store).
- A private key that matches the certificate is present in the Local Computer's store and is correctly associated with the certificate. The private key must not have strong private key protection enabled.
- The Enhanced Key Usage extension includes the Server Authentication (1.3.6.1.5.5.7.3.1) object identifier (also known as OID).
- The Active Directory fully qualified domain name of the domain controller (for example, DC01.DOMAIN.COM) must appear in one of the following places:
- The Common Name (CN) in the Subject field.
- DNS entry in the Subject Alternative Name extension.
- The certificate was issued by a CA that the domain controller and the LDAPS clients trust. Trust is established by configuring the clients and the server to trust the root CA to which the issuing CA chains.
- You must use the Schannel cryptographic service provider (CSP) to generate the key.
(Technically, it may even be a self-signed certificate, though this isn't a secure solution.)
Once you install this certificate, the domain controller will automatically enable LDAPS service on port 636. (And global catalog service on 3269.)
So far I have only described LDAPS but not specifically StartTLS.
You may use startTLS against a Microsoft LDAP server if you wish:
https://msdn.microsoft.com/en-us/library/aa366997(v=vs.85).aspx
It doesn't require any additional configuration on the server. It just involves the client sending the correct LDAP controls (commands) to the server. (The control OID for startTLS is "1.3.6.1.4.1.1466.20037".)