The non-Pro version now comes with "Device Encryption" enabled by default. It's like BitLocker Lite, where you have little control over it, can't use BitLocker To Go for portable drives, can't encrypt anything but the system drive, can't configure it to work with anything except the TPM, and it must store the key in a Microsoft account. You can just search in settings for Device Encryption to disable it.
Encryption has its uses if you're worried about the data on your laptop being accessed, since it makes it impossible to read the drive on any other system without the recovery key, or even accessing the local administrator account and resetting the password. Most stolen devices just get erased and pawned/sold, though, if you're not a medium/high-value target that might have data like passwords to bank accounts and email on your device. You won't have any "issues" from turning it off, in terms of functionality, and of course it makes it possible for YOU to recover data easily from the drive if the system dies, at the expense of that data security.
One of the downsides of Device Encryption is that it uses software encryption if the HDD/SSD isn't self-encrypting (which may be the case on most OEM machines which use cheaper versions of drives), which means the CPU is doing all the work rather than the drive controller doing it. That has resulted in a lot of discoveries of PCs/laptops seeming to be much slower than they should be because of the overhead of the CPU encryption, which the user didn't explicitly ask to be enabled and isn't informed will happen. (BitLocker will also use software if the drive isn't an SED, but at least the user had to take explicit steps to turn that on. They still aren't warned about the performance impact, though.)
When you disable Device Encryption, it will just show that the status is Decrypting, until it finishes. Then nothing will be any different from before except maybe a faster machine.