Improving the Anonymity of the Lightning Network using Sub-Optimal Routes