Those domain names are not correctly resolving at the DNS servers that have been defined as your authoritative DNS servers. see http://dnsviz.net/d/www.lbp-etps.com/dnssec/ for errors
Dig just checks whatever your computers DNS server is (often your ISP ) for the records for a domain. This could be old or even spoofed, so Let's Encrypt always refers back to what your domain name claims are it's authoritative nameservers.
In your case if you do a "whois" of your domain you get
Thanks for the information. Can I also get a reply of my second question which is setting up a redirect on https for domain validation as the customer has blocked http at their end.
http-01 - this will always try and validate on port 80, but will follow redirects ( to https etc). You would need to be able to place the redirect on port 80 though - so may not work for you.
tls-01 - this tests on port 443, and needs to provide a specific signed certificate on that port.
dns-01 - this does not need access to your server, it needs a TXT token placed in your DNS records. If you have an API to your DNS, then this can be very easy, it is more complex if you need to manually update your DNS records every time though.
At the top level, simply use a client like certbot and it will do it all for you.
At the detailed, programming, level it's defined in the AMCE protocol
If you want specific instructions I'd suggest starting a new topic in help, and provide as much information as you can ( fill in the template form for domain name, host, operating system, if you are on a shared or dedicated server, if you use a control panel etc ) and we can provide specific instructions. Without that information it's difficult to be specific to your requirements.