kslt90
You are only looking at one side of a multi-dimensional risk. Unless you are manually unlocking that data drive on every boot, your encrypted data drive is unlocked by way of instructions from an unencrypted root. All one needs is a recovery disk or to mount the virtual root disk, install their vulnerability and boot the server that conveniently decrypts your encrypted data drive for the attacker to copy the data.
With an encrypted root, you can enforce secure boot on top of the encryption safeguarding those unlock instructions for the encrypted data disk making the system much more difficult to compromise. If an attacker can't compromise the root, they will have to fallback to conventional vulnerabilities, brute forcing the data disk, or compromise by some other means - all of which are much harder and require significantly more skill (and likely time) then simply breaching the unencrypted root.