Assuming you already know how to use filters with tshark, just supply the following display filter:
ssl.handshake.type == 1
If you want all ssl traffic, simply put ssl
as the filter.
You cannot use these directly in the capture filters as the capture filtering mechanism doesn't know if the payload is ssl or not.
Alternatively, if you know what port the ssl traffic is going through, you can use a capture filter for that port, eg if the ssl traffic is going on port 443, use filter port 443
For more reading refer :
More extensive list of ssl display filters here.
How to capture ssl using capture filters
An example command for you to capture ssl traffic in a human readable format and put it in a file will be :
tshark -i <interface> -c <no. of packets to capture> -V -R "ssl" > capturefile.txt
Or using capture filters
tshark -i <interface> -c <no. of packets to capture> -V -f "port 443" > capturefile.txt
Also refer to the tshark man page for more details.