First of all, it would be a usability nightmare.
Second, it wouldn't even fix the problem it purports to. While it could be effective to phishing mails designed for 'normal' clients, attacks designed to suir such systems would probably be even more effective.
The users of such networks would be used to using all kind of alternative ways to refer to urls. Suppose I wanted to link to this question and ask you to upvote my answer, as you don't allow me to write  https://security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative I could say:
- security.stackexchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
 
- https:/ /security.stack exchange.com/questions/215871/redacting-urls-as-an-email-phishing-preventative
 
- Go to security SE question 215871
 
- bitly 2ZoZiTS
 
- Link sent to your personal mail
 
- Please call to 555-0123 so I can give you the actual url
 
- Search "Redacting URLs as an email-phishing preventative?" in Google
 
- See last active question
 
- hotel  tango tango  papa  sierra colon double slash sierra  echo  charlie  uniform  romeo  india  tango  yankee dot sierra  tango  alpha  charlie  kilo  echo  xray  charlie  hotel  alpha  november  golf  echo dot charlie  oscar  mike slash quebec  uniform  echo  sierra  tango  india  oscar  november  sierra slash two  one  five  eight  seven  one slash romeo  echo  delta  alpha  charlie  tango  india  november  golf  dash  uniform  romeo  lima  sierra  dash  alpha  sierra  dash  alpha  november  dash  echo  mike  alpha  india  lima  dash  papa  hotel  india  sierra  hotel  india  november  golf  dash  papa  romeo  echo  victor  echo  november  tango  alpha  tango  india  victor  echo
 
- Url sent in an attachment
 
Note that some malicious mails already use urls in attachments as a way to [attempt to] bypass email filters. You might think "I will just strip urls from attachments, too", but that will cause havoc when the documents your users are redacted get silently corrupted by the email system. The formatting may possibly break everywhere, too. Not to mention that such endeavor might require you to be able to (properly) recognize and edit almost every existing file format.
Additionally, your legal department will probably bar you completely from modifying the invoices (received as email attachments), no matter how innocuous the edit.
Also things like recovery links for forgotten passwords would not work at all for your users, either.
But IMHO the main problem would be that the users would be "trained" to do all kind of weird workarounds, a "hidden url" that made them go through such hoops would not raise any suspicion at all.
(And as noted by Joseph Sible, your antispam filter would not be able to examine the obfuscated urls)
Some examples:
- Make the user to search "StackExchangeBank blocked credit card" on Google. Then make a phishing page for the StackExchangeBank appear top by using uncommon words, or even buying ads.
 
- If you call me so I give you the url that would be otherwise filtered, I can send you to a phishing page, adding some live social engineering to make you it more credible than just a plain email.
 
- Send them through a url shortener. The user will have no idea where it is getting sent
 
- The n-th question on the list would obviously change, so it would not guarantee the user to arrive to the "legitimate" question you asked, instead voting on a different question "impersonating" the one he was expected to reach.
 
A much saner approach would be that you changed the urls to go through a redirecting service of yours. Some email security filters already do that. This way they can check, when the user clicks the link if it is listed on a blacklist (where it might not have been when the email was received), and thus block the access. You might also have it show a Big Scary Warning that they are Not going to a safe website, the moment they try to reach a not-whitelisted site (only those they have credentials to, supposedly). And still, such approach would be somewhat flawed since the users will actually have credentials to more sites than those whitelisted at the proxy to not show the warning, and legitimate sites often decide to put out content of theirs on a new domain (which wouldn't appear on the whitelist, obviously). If there are too many false positives, users will end up paying little attention to them, as it would be 'normal' to receive them.