MLPS VPN doesn't provide any sort of encryption out of the box. It provides security through isolation, not encryption. When you contract for WAN service using MLPS VPN, the telecom company is providing some guarantees that your traffic will be somewhat isolated from the rest of the traffic. AFAIK, all of this talk about the VPN encryption doesn't apply to MLPS VPN.
So really, there are two questions here:
1. If your data were compromised by someone with access to the LAN, does that pose a risk?
2. Is it easier to compromise a WAN connection?
Only you can answer #1. As others have pointed out, if any of this data is sensitive or can reveal information about other systems that can be used to compromise your network, then you need to protect it. Does it reveal anything about the gateway, it's security, behavior, users of the gateway, softwaer info, network configration, etc... then the risk of leaving it unprotected might be unacceptable.
As for #2, the answer is yes. The major vulnerability is the physical security issue. The traffic is physically outside of your control for a long distance--i.e. you are relying on the telco's physical security (badges, locked doors, buried fiber lines, etc).
The other major vulnerability is how the telco has setup the routers and other equipment that handle your WAN traffic. Are those routers physically/logically separated from other networks? What other traffic is carried by those routers? Can those routers be remotely administered remotely (perhaps via the telco LAN, another MLPS WAN, or via the Internet)?
Any of those devices can be compromised; hence, your unencrypted WAN traffic is at risk.
So, really, this comes back to #1. What are the potential consequences if your network traffic were compromised?