You're missing the point, which both ocicat and bsdfan666 made -- if you want to have any traffic
encrypted, well, that takes two entities, one at each end: an encrypter, and a decrypter.
You have only one "end point". It takes two to tango.
There are anonymizing services, of course. For one example, google for "tor"