Hi Faas, Jason,
Unfortunately, once a machine is removed from Active Directory and reimaged, the BitLocker recovery keys that were stored in AD are permanently lost. The TPM itself does not retain the recovery key in a way that can be reused after the operating system is reinstalled, which is why the drive is still prompting you for the key.
BitLocker is designed this way to protect against unauthorized access, so there is no supported method to bypass the recovery prompt or extract the key directly from the TPM. The only way to regain access would have been to retrieve the recovery key from its original backup location (Active Directory, Azure AD, or manually saved file/printout). Since those keys were deleted along with the AD entry, the encrypted drive cannot be unlocked.
Going forward, I recommend implementing a policy to automatically back up BitLocker recovery keys to Azure AD or Active Directory before reimaging, and to export them to a secure external location as an additional safeguard. This ensures that even if a machine is removed from AD, the keys remain accessible.
I know this is not the outcome you were hoping for, but I hope this explanation clarifies why the TPM cannot be used to recover the lost keys and helps you plan stronger safeguards for future deployments. If you find this answer helpful, please click Accept Answer and kindly Upvote it so others can benefit too.
Jason.