You cannot. sslstrip exists to attempt to work around the fact you can't directly downgrade HTTPS to HTTP.
In that video, because HSTS isn't used on match.com (unfortunate), the browser doesn't attempt to make an HTTPS connection at first. Obviously, if you have control of that TCP connection, you can do whatever you want. The browser is oblivious to HTTPS existing.
Also, be careful not to confuse the layers here. The encryption algorithms in WPA2 are completely unrelated to TLS/HTTPS. TLS is... somewhere in the OSI model, but it's well above WPA2/packet handling, and TLS can/does work with a compromised network.
I think this will only work against android/linux clients, since in that case the attacker actually knows the key, and can perform a proper MITM.