sysadmin approach
Popular TLS implementations have already served vast numbers of connections, some of which from people trying to break them. Patch testing procedures may be sufficient. First, let community testers and early adopters try it. Then, your test environments with typical workflows. Finally, an incremental rollout to production where possible will throw lots of traffic at it.
infosec approach
If your build does not receive as much attention, possibly you want to try and break it. Certainly, hunting for new issues would require more than passive use. Security.SE has experience in TLS specifically and denial of service in general.
Regarding tools, look for TLS oriented test suites and fuzzers. These do invalid or exotic things. For example, tomato42/tlsfuzzer. I have no specific experience with this, but it has a non-trivial number of features and can be run against any TLS server.