Like fstrim, blkdiscard just sends the appropriate commands (TRIM for [S]ATA, UNMAP for SCSI/SAS, and a Data Set Management/Deallocate for NVMe) to the SSD in question, and the disk will decide on its own when it will actually do the erasing.
To maintain its write performance, a SSD wants to keep "enough" pre-erased blocks ready for writing, as the erasing of the old data is the most time-consuming operation in the lifecycle of a SSD block. So the blkdiscard just causes the blocks to be appended to the "to be erased" queue, not actually immediately erased for real. So the primary purpose of blkdiscard is to maintain good disk performance when a SSD is recycled to new use; as a side effect, anti-recovery may or may not be achieved.
https://security.stackexchange.com/questions/109916/does-the-ata-trim-command-irrecoverably-delete-data-on-an-ssd
If a SATA disk claims to support "Deterministic read ZEROs after TRIM", that would be a promise that the data will be unrecoverable with regular OS access immediately after using blkdiscard or similar. You would see this in hdparm -I information for your SSD. Unfortunately, not all SSDs make this promise.
Also, if your attacker has the SSD physically in their hand and some tools, special knowledge and/or skills in the Electrical Engineering domain, they might be able to get the SSD into Manufacturing Mode, which will stop the SSD from processing the erase queue and allow access to the raw storage, enabling them to read the contents of any blocks that have not been actually erased yet.
See: https://blog.elcomsoft.com/2019/01/life-after-trim-using-factory-access-mode-for-imaging-ssd-drives/
You could still use disk encryption for a dedicated data partition, with the encryption key stored on a small unencrypted partition. The destruction script would then first unmount and blkdiscard the key partition, unmount the data partition and execute cryptsetup close (or equivalent) on it, then create a lot of demand for freshly-erased blocks by starting to fully overwrite the encrypted data partition with some repeating data.
Assuming your disk encryption algorithm of choice is not weak, once the blocks with the encryption keys get erased and recycled by the overwrite operation, your data should be very effectively unrecoverable even if some parts of the encrypted partition have not been completely overwritten yet.
You may find some useful parts for the destruction script here: https://security.stackexchange.com/questions/171396/ssd-erasure-verification