Tokens could be included in a users traffic request, which would allow websites accessible through the Tor network to “intelligently prioritize which requests it answers.”
Source: https://www.coindesk.com/tor-anonymous-tokens-stop-hacks-dos-attacks