And another Tweet (by Murch, who reviewed the protocol paper) with a clear reason why this is needed:
No, this is more about "how can you make sure that your mobile phone is talking to your own node at home without standing out like a sore thumb": by everyone running an encrypted connection that looks like it might have run an authentication protocol. :)