What you're referring to as Proxying through BurpSuite is how Burp allows you to sniff and manipulate traffic, or perform what is called a Man-in-the-middle (MiTM) attack .
Burp Proxy lets you intercept HTTP requests and responses sent between Burp's browser and the target server. This enables you to study how the website behaves when you perform different actions.
https://portswigger.net/burp/documentation/desktop/getting-started/intercepting-http-traffic
This action isn't about hiding the identity of the request initiator from the server, but rather read or manipulate the content of the request or the response, in order to collect data or try to make one of the applications (the server or the client) do something that it isn't intended to do.
What you're looking for is setting up an Upstream proxy server.
These settings control whether Burp sends outgoing requests to an upstream proxy server, rather than sending them directly to the destination web server.
https://portswigger.net/burp/documentation/desktop/settings/network/connections#upstream-proxy-servers
Which can be configured under the User options -> Connections -> Upstream Proxy Servers section in Burp.