I'm not referring to you, I'm referring to the fact that if someone on your network wants to find out, there are several ways.
The fact is that I believe everyone here will agree that there is a rogue server on your network, but what you can't know is whether it's intentional or not.
You have to create a less specific filter in your capture. If I were you, I would only filter for DHCP requests and DHCP offers.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.
Please, if this post was useful, leave your kudos and mark it as solved.