Ubuntu & its deviates do offer full disk encryption and Logical Volume Manager (LVM) during the installation process, found on the Ubuntu installer (pictorial guide) https://help.ubuntu.com/community/GraphicalInstall
Then there is the manual installation. http://linuxbsdos.com/2014/01/16/manual-full-disk-encryption-setup-guide-for-ubuntu-13-10-linux-mint-16/
Both methods work, USUALLY applied to full disk encryption, both will need need a separate BOOT partition and there are systematic differences of opinion about encrypting the swap partition.
Conclusion
Manual or Auto full disk encryption work, depending on your requirement. Auto requires ONE password to unlock the encrypted partition. Should you opt for the manual method it will require THREE passwords to unlock all encrypted partitions, then your normal password to gain access to the desktop.
It is essential that you keep the boot as a non-encrypted ext2 partition.
The pros of an encrypted system outweigh the cons, but you have to remember it is only, though a powerful front door key, once open and left unattended, it is easy for some one to copy and paste data to a fat32 memory stick.
Protected with BIOS password, adds another layer of security, plus move the Hard-drive to the 1st boot position and the DVD or USB to the 2nd and 3rd boot position. Makes a dormant computer near impossible to break into, for a large majority of humans.
Caveat
As UEFI and GPT is becoming the norm, has throw other variables into the mix, it works with HDD technology in legacy mode, but I was unable to to find a solution when utilising an SSD and UEFI, the auto installer didn’t at the time allow for two separate (esp and ext2) boot partitions or the necessary SSD maintence becoming a potential flaw, data leakage.
The OS-probe probably won’t find the second OS on either on your disk or if you have second HDD.