Cloudflare provides “family shields” for DNS servers that block malicious and adult content. However, the names for the IP addresses are not entered in Cloudflare’s DNS which makes TLS verification/usage impossible.
I would suggest using the names one.one.one.two for 1.1.1.2 and 1.0.0.2; and one.one.one.three for 1.1.1.3 and 1.0.0.3.
This follows the current scheme of the name one.one.one.one for 1.1.1.1 and 1.0.0.1.
security.cloudflare-dns.com for 1.1.1.2 and 1.0.0.2
family.cloudflare-dns.com for 1.1.1.3 and 1.0.0.3
These hostnames comply with the DNS-over-TLS and DNS-over-HTTPS standards. You can find more details in Cloudflare’s documentation for 1.1.1.1 for Families.
Unfortunately, this won’t be possible since .two and .three are not registered TLDs.
the names for the IP addresses are not entered in Cloudflare’s DNS which makes TLS verification/usage impossible.
This is incorrect (in bold). If supported by the client, A TLS connection can absolutely be established with only the public IP address (no hostname) when it is a Subject Alt Name (SAN) in a certificate issued by an authority that allows this, like in the certs for 1.1.1.1/2/3. You can verify this with a DoH query (but this also applies to DoT) like the following: