Hi Vikas,
No you do not need to enable anything. This is automatically handled by the OutSystems platform.
I once had that same finding coming out of a penetration testing tool and it turned out to be inaccurately flagged as a CSRF attack.
As I understood from OutSystems Support back then, the value of the CSRF token is included in the encrypted ViewState that is sent with each request. The used CSRF token is the value of the osVisitor cookie. When the request is received on the server, the platform decrypts the ViewState using a local private key that is never shared and checks if the CSRF token sent in the ViewState is the same as the one the osVisitor cookie contains. Since the ViewState could only be decrypted using that local private key, it is not possible for an attacker to successfully forge a request.
Hope this helps!
Regards,
Nordin