If you're referring to the prevention of DLLs being loaded if they are malicious then it will depend on if the DLL is detected by the real-time scanner (so when DLLs are being loaded by programs they should be scanned by the product and if they are found to be classified as malicious then the module will be blocked from being loaded into the memory of the target process attempting to load the DLL).
However, if you're referring to preventing a DLL being loaded which has been hijacked (e.g. system DLL which is vulnerable and thus malware has successfully patched it so it executes malicious code when it's loaded by a process and then jumps to the original code), it really depends on the situation and the product - and I am unaware on specific software which support mechanisms for attempting to detect this behaviour.
Without that being said, Emsisoft Anti-Malware does support protecting against "patching" of other programs. Although, I am unaware if this feature supports protection against DLL hijacking attempts (e.g. replacing a DLL with another one with the same file-name to trick software into loading the rogue copy and executing the malicious code). The chances that it does include protection against DLL hijacking to an extent are high though.
Hopefully I didn't misunderstand you again...