That depends on the level of logging they are doing. LE could ask them to log source and destination IP addresses, then they look at who sent requests to LE's server.