@gustavo You should be able to use the -trusted_first option in your openssl command to validate correctly. That was the Workaround 2 in the doc that @abdul201588 provided.
I could not show you the result of -trusted_first because your client has already changed their server and is no longer sending any chain - just a single leaf cert. Which will not validate.
Don't ask me how, but if you configure the LDAP server to send just the R3-signed-by-ISRG Root X1 intermediate, OpenSSL 1.0.2 should connect fine, assuming the client has ISRG Root X1 in their root store. You'd lose Android pre-7.1.1 compatibility, but I'm assuming that's fine for a LDAP server.
If the clients don't have ISRG Root X1 in their root store, there's nothing you can do anyway.
Thank you guys, already solved the issue, as my clients are trying to issue ISRG in X3, I generated another certificate in other entity i used sslforfree.com, now I´m able to connect the clients and update the trusted store.