This hasn't been possible until WPA3, which has barely started rolling out.
Take the example that you are connecting to an SSID named "Airport_Guest_WiFi". In the case of OWE you simply connect and now everything between you and "Airport_Guest_WiFi" is encrypted. In the case of PSK with SAE you connect to "Airport_Guest_WiFi" and exchange information to generate secret keys only you two know. The problem in either scenario is you've just set up encryption not trust. How do you know the "Airport_Guest_WiFi" you connected to was the airports or the attackers?
WPA3 Enterprise solves this issue somewhat but is not realistic to deploy for temporary guest networks.
I argued ever since I heard OWE was going into draft it should have some optional mode for PKI validation. E.g. if you connect to the SSID "guestwifi.airport.com." and the airport signed the hello with the cert for that domain then the client could validate that against it's root stores and have the same level of identity trust it does when connecting to usersbank.com. Clients need not be forced to validate it but at least it gives a realistic option to connecting to such networks.
Make the password widely-known. Announce it over the intercom. Post it on the walls.
Offer both encrypted and non-encrypted SSIDs. The non-encrypted SSID could even just be a captive portal with instructions to connect to the encrypted SSID.
If you're feeling wild, use WPA2 Enterprise, and accept any credentials.
https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#Lack_of...