Absolutely.
The one sniffing the network might see a DNS query (if the authoritative server lies within the target network). That is hint #1.
The sniffer also sees the certificate requested by you (the client). This is part of the TLS handshake. The certificate certifies (duh) that all data exchange is actually happening with foo.com. This relation is expressed through SNI (Server Name Indication).
So once this happens, all the data at HTTP level is encrypted.
Remember the OSI network stack. The Session layer is Layer 5, then comes the Application layer (HTTP). All data beyond Layer 5 is thus encrypted.