Transmission of the data is not in the scope and neither is strength of the said encryption.
The only way you could use an address would be if you used a system where the password (for encryption) were derived using the address and a secondary secret communicated between 2 parties separately.
For example a very simple implementation would be:
1. Alice sends secondary password through snail mail to Bob
2. Alice derives encryption password using SHA256(secondary password | address)
3. Alice encrypts the message using password from step 2
4. Alice sends the encrypted message to Bob
5. Bob repeats step 2 by having both inputs
6. Bob decrypts the message using step 5
Obviously it is so much easier and a lot safer to have their public key and encrypt a message that way using an algorithm such as ECIES.
I can't seem to find any tool yet to know the public key of any address without spend transactions.
It doesn't exist because it is not possible to reverse a hash.