Maybe this isn't clear from the video, but none of the techniques that have been shown have anything to do with an attack or malicious behavior. This is about a legitimate user configuring their TLS client to save the client key material to a file, so that network traces can later by decrypted. Note that the user has already seen the same network traffic as plaintext, so decrypting the traces doesn't expose any new sensitive information – it's just helpful for debugging and analysis.
Since there's no attack, there's also nothing to prevent. You might as well ask: How do we prevent a bank customer from using their card and PIN to withdraw money from their own account?
Of course there are all kinds of attacks against TLS, but the video has nothing to do with that.
The reason why it's so easy to decrypt the traffic in this case is because TLS clients are purposely designed to support the feature of saving key material to a file, and TLS itself is a standardized, well-known protocol. Neither of these facts should be in any way problematic.