The DCs are listening on 389 or I would be having bigger problems. They are listening on 636 as well because we have some apps using LDAPs.
Your reply is very helpful because you got me thinking to try a couple of things on one of the Windows 2019 DCs:
I ran netstat and could see established LDAP connections. The very first one I checked happens to be a Mac. I had seen successful connections from Macs in the security logs for Kerberos connections, but this proves Macs are able to make LDAP connections specifically.
I used LDP to make a simple bind to one of the Windows 2019 DCs and it did in fact generate one of the 2889 warnings.
So at this point I feel that there is nothing to worry about since I know the Macs are able to use AD as needed. I still don't know why I'm not seeing the 2889 warnings from the Macs (or vCenter or a few other third party apps using insecure LDAP). For now it really doesn't matter because we are not requiring LDAP signing.
Thanks for the help!