the privacy use case of lightning just has not been fleshed out well by anyone yet, it's there...
i was designing a tor-like relay network last year that used a form of onion TLVs with source routing and micro accounts paid for by keysend/AMP payments, which required a different arrangement to public LN node networks - primarily do small payments and are mostly automated and they more openly advertise their channels between each other because you don't pay them by asking for invoices, you just zap them with a special code that unlocks a two key message to pay for a session and then you can use the node in a hop for general network traffic relaying
https://github.com/indra-labs/indranet in case you are curious
would be cool to get it at least to a point of running a test network to explore how effective it is... the thing was that it uses libp2p which limits the scale of its connectivity, it really needs a connectionless UDP protocol so relays don't need to know about the existence of the next hop, only its address and port