As a complement to davidgo's answer :
Using SED in addition to LUKS is also an EASY way to encrypt the boot partition (doable with LUKS alone, but not always straightforward), and is the ONLY way to encrypt the EFI partition.
Plus, if I understand correctly, a SED drive is already encrypted anyway. The thing is that its encryption key is not protected out of the box by an authentication key. Once you've set up your authentication key, then the encryption key is protected. So, by default, you are using SED's encryption anyway, only without having protected its encryption key.
Thus, the only question when you have a SED drive is : do I want to type in another password ? Using SED (e.g., setting up an authentication key) with LUKS can be interesting in some cases, for example if you choose to auto-decrypt your LUKS by storing the key in TPM. That way your disk is protected by your long LUKS passphrase, but you don't have to type it, you just type in your shorter SED password (I believe SED have an anti brute force mechanism).
Although, I believe since Systemd v251 the TPM can also be protected by a PIN code, so you can have the same functionalities with LUKS only (store your LUKS key in TPM, and protect it with a shorter password - I believe TPMs also have anti brute force mechanisms).