Meraki absolutely gives you the ability to 'contain' other SSIDs that you see. Rogues, others, whatever.
Do not do that. I'm not going to name names, but I've been told in Meraki trainings to not use that feature set, at least not in the US.
Why? Because the FCC can and will fine people for it.
If you find an actual rogue on your network, investigate it and then block or reconfigure the device as necessary. Not the SSID. Actual rogues are, very frequently, printers or somebody's authorized work laptop. Or devices that you want to deny access to anyway.