TOR, nym, i2p, etc could help but the metadata behind the comms patterns can make the server identifiable.
They wouldn't help in this case as it was a seizure incidental to something else the admin was doing. I guess isolating to a data center with unique payment info?
The core issue is that the server knows the content.