No. Since root can overwrite kernel memory, any software-based protection mechanism can't work.
root is properly restricted (e.g., cannot investigate memory, etc),
If a process's uid is 0 in the root PID namespace, it is a super user and can do such things. Now your "etc" might mean "heavily modified system", but that can mean anything, including "replaced the Linux kernel with MacOS", so either you define that "etc" very precisely, or we need to assume that you're "just simply root on a Linux system".
There are safe, Linux-kernel-supported ways of storing cryptographic secrets, which become completely impossible to read at all, but can be used to encrypt or decrypt things. Different problem, and different solutions (TPM drivers, secure enclaves).
I'm not sure what exactly you're looking for here – you picked the "Kernel Key Retention Service", and that's really meant to hold readable keys for kernel components that need them (there's really no need for your kernel to hold the keys for, say, your HTTPS server; that's a userland problem, and can better be solved in userland. But it needs a way to hold the keys for, say, kerberos so you can mount encrypted NFS, because that's a kernel problem).
If you're instead looking for the same mechanism with which your kernel was unalterably-by-software "verified at boot time" to store keys, you should really be looking into TPM/TPM2, e.g. this redhat document.