they can see the connections, the volume, and the ciphertext being exchanged, but unless...
A) the server is compromised
B) the client is compromised
C) they can break the key exchange algorithm or the symmetric algorithm being used
...the ISP or any other MITM cannot see the plaintext. by design.