I'm not sure CT logs would help in practice. Assuming a site owner religiously monitors CT logs (who actually does that?), notices a cert they didn't mean to issue, and then issues a CRL or OCSP change (do most people even know how to do that?), the client application has to download the lists and respect it, and many (most?) clients do not.
The site owner may know about the compromised cert, but the users/clients will be blissfully ignorant and unable to do anything about it.
FWIW let's encrypt does multi perspective validation, but it is not a requirement currently.
The best thing to do as a site owner is to regularly check CT logs or use a service that does that for you.