A cloud-based identity and access management service for securing user authentication and resource access
You cannot really prevent such "brute-force" attacks, at least not without creating additional inconveniences for the user. As Entra/M365 are globally available cloud services, anyone that knows the user ID/UPN can attempt to login. Changing the UPN to a new value can (at least temporary) alleviate the issue, but will force force the user to relogin at best, and might cause issues with some apps, at worst. Plus, it is no guarantee, as soon as the attacker gets the new UPN, the issue arises again.
The best thing to do is make sure you've covered the basics - the user account (in fact ALL user accounts) should be protected by MFA and ideally using a phish-resistant auth method. Conditional access policies should be in place to restrict login attempts via less secure methods and from unknown locations (or unmanaged devices, if your organization uses an MDM solution). Keep in mind that none of these will prevent new login attempts though, they all act after the initial credential validation.
Microsoft does have some protection in place to block such attempts, but as you can see, not everything is covered. Plus, you have no control over the settings for Smart lockout and such. It's just a fact of life with cloud services.