First, there are two main ways to encrypt a hard drive:
- Fast encryption, which leaves the free space untouched until overwritten from normal disk use. This free space can contain old data left unencrypted.
- Full encryption, that can either uses a first pass to fill the unused space with random noise, or it can encrypt the unused space.
Since you want to erase data after the encryption, I think you are thinking about the second method. However, please note that encrypting before wiping a disk is equivalent* to overwriting it with random (from /dev/urandom) data before overwriting it with zeros, but it is less efficient because encrypting will perform the extra useless step of reading the data before overwriting it.
Then, would that be enough to be sure that no data remains? That depends on your threat model. That is, what are the resources at the disposable of those likely to get your disk? If they can only read data using the standard drive interface, then one pass of a full overwrite is enough. If, however, they can spend a lot of resource on specialized and expensive equipment to attempt to recover traces left from old data, then please refer to this question.
* Because properly encrypted data cannot be distinguished from random data without knowing the encryption key.