To answer this question directly:
is using just proxy protection for this?
Possibly, but a proxy would have to be specially configured to manipulate the traffic it receives. Even then it is still might go over the ISP "wire" where they inspect the traffic and forward it along. Keep in mind a proxy is just something between your end point and the intended endpoint. So unless the proxy just sends the traffic over another wire entirely (like what a web proxy does), your ISP will still get it. To what level an ISP can inspect that traffic is outside of the scope of this answer.
Is using this tool: https://guardianproject.info/apps/orbot/, protection for this?
"Protection" is subjective. Some believe that the entire Tor network has been compromised, while others believe it to be a true anonmyzer. It really depends on what you think offers the greatest level of protection for you. Everyone in the InfoSec field will confirm you do security in layers. But I digress - Orbot:
uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world.
So more or less it sends your app data connections over the Tor network. Some app servers might be okay with that but some others might not.
or this: https://play.google.com/store/apps/details?id=info.guardianproject.orfox ?
Again, it all depends on your comfort level of protection. In the application description it says:
THIS IS A BETA RELEASE MEANT FOR PUBLIC TESTING ONLY. PLEASE DO NOT RELY ON THIS FOR STRONG ANONYMITY UNTIL ALL TESTING IS COMPLETE.
If you are really serious and want to hide your traffic, you would use a VPN with an anonymizer. But that is another discussion entirely.