Not really. In the end, all your private keys are stored on disk, and your passphrase is already what guards them against being stolen.
GnuPG 2.x sort of works the way you want. In 1.x, "exporting" just copied the relevant chunk of the secring (still encrypted, without any change) to the output file. In 2.x, key export goes through gpg-agent, which wants to first decrypt the key using the current passphrase and reencrypt it with a new one.
But even if exporting was forbidden, someone could easily copy the secring.pgp
or private-keys.d/
directly from your ~/.gnupg/
. Without knowing the passphrase, however, they're useless.