You don't.
Well, that's a complicated matter.
That's not correct. A
(or AAAA
) records must exist in your zone, and the TLD will likely choose to require that glue be registered for every hostname and IP address (at your registrar), but the other nameservers are not required to be in the delegation or authoritative NS
record sets for your domain.
As an example, jquery.com.
uses these two nameservers:
jquery.com. (unsigned) 84934 NS george.ns.cloudflare.com.
jquery.com. (unsigned) 84934 NS lara.ns.cloudflare.com.
But cloudflare.com.
itself uses different ones:
cloudflare.com. (signed) 86400 NS ns3.cloudflare.com.
cloudflare.com. (signed) 86400 NS ns4.cloudflare.com.
cloudflare.com. (signed) 86400 NS ns5.cloudflare.com.
cloudflare.com. (signed) 86400 NS ns6.cloudflare.com.
cloudflare.com. (signed) 86400 NS ns7.cloudflare.com.
cloudflare.com.
itself -- and your domain -- do not need to to have tons of NS
records, and your domain doesn't significantly benefit from it.
Ignoring other matters (like CAA
and DNSSEC), Let's Encrypt doesn't really examine the NS
records much.
The authoritative DNS servers don't have to include an authority section, or additional section, in response to most queries.
But when they choose to, the recursive DNS server implementation, by default, passes the information along to clients, and Let's Encrypt's validation software logs it.
If the authoritative nameservers gave more minimal responses, I think this issue would be avoided.
That's one of the two most critical things a CA does. 
Incidentally, the delegation for your domain only includes 3 nameserver names, with only 1 IP address. That's a dangerous single point of failure for resolving the zone.