TCP port 636 is used for LDAPS, which is LDAP with TLS from the first byte.
A port is a transport layer number used together with an IP address and a protocol such as TCP or UDP to direct traffic to the correct service on a host.
A server process binds a socket to a port and listens, while a client typically chooses an ephemeral source port for outbound connections.
The combination of source and destination IP addresses, source and destination ports, and the transport protocol uniquely identifies a flow so the operating system can keep many conversations separate.
Firewalls, NAT, and scanners talk about ports because the destination port is the stable rendezvous point that exposes a service to the network.
A directory server listens on 636 for clients that require encryption immediately, rather than connecting on 389 and negotiating StartTLS.
The real flow is: TCP handshake, then TLS handshake with certificate validation, then LDAP bind and directory operations inside the encrypted session.
This protects credentials and directory attributes in transit, but it does not automatically make directory access safe.
Permissions, service account scope, and monitoring still determine how much data is exposed if an account is compromised.
Operationally, certificate trust matters a lot here.
If clients cannot validate the LDAPS certificate, authentication can fail at scale or users may learn to ignore warnings.