The closest means you could get to testing that the library you loaded is the library you expect would require that you cryptographically sign both the executable and DLL.
You sign the executable to ensure that it has not been tampered with, you sign the library to be able to ensure that the library you find is the one you created.
If you need to go to this level of paranoia you likely won't be using __declspec(dllimport), instead you would locate the DLL, test its cryptographic signature then run-time load it (LoadLibrary/GetProcAddress).
I suppose you could do __declspec(dllimport) with delay-loading as long as you provide a custom delay-loader helper but you would then need some way of telling that helper which files need extra processing (simply checking signatures wouldn't be enough because an attacker could provide a DLL that was signed with some other certificate, you need to make sure that the library in question was signed with your certificate).