Oh, not to mention the possibility of them blocking well known VPNs "to prevent piracy." Many open WiFi providers already do this.
Detailed, up-to-date comparison chart of hundreds of VPN services:
Detailed list of mostly open source, private/secure replacements for popular products and services:
If you feel you can trust a datacenter, the most trustworthy approach would be running your own OpenVPN instance in another country.
Although if you don't want to go through the hassle and do decide to put some amount of trust in a VPN service, I have found That One Privacy Site  to be a great resource for researching VPNs.
No affiliation, just a happy customer.
Picking a US server at random, (US20) it seems to be hosted here
In what appears to be their NJ datacenter located at:
DuPont Fabros, 101 Possumtown Road, Piscataway, NJ 08854
> Internet Protocol (IP) Addresses
> DigitalFyre uses your unique network address and SessionID
> to help diagnose potential problems with equipment, to help
> tailor content to match your preferred interests and to
> otherwise administer the Site.
This topic has the opportunity to become a huge discussion, so for the sake of brevity I'll summarize with my personal, opinionated solutions for various use cases.
1. You don't trust your ISP
1.1 Switch ISPs (not always practical)
1.2 Setup a VPN on a $2.50/mo or $5/mo VPS (this could incur bandwidth costs
if you're pushing multiple TB per month across the VPS. Note you're still
at the mercy of the VPS and their colo, but no different than today with
a VPN provider.)
2. You don't trust the public network you're on
2.1 VPN back to your home. This would be free.
2.2 See 1.2
3. You don't trust the site operator of the site you're visiting
3.1 Use Tails linux and Tor
That's the use case. For many Americans there is literally no viable option here.
Take Albuquerque for example: if you want a solid 20mbit connection or better, your only option is Xfinity (Comcast).
Don't even get me started on mobile data.
- Ubuntu on my desktop and laptop
- CyanogenMod on Android 
- VPN to a non-14 eyes country 
- uBlock Origin, PrivacyBadger, Disconnect
- Null-routed most CDNs (e.g. Google APIs)
- Gaff tape over device's cameras if I couldn't physically disable them
Now obviously those measures go far beyond protecting you from just ISPs, but it was designed to take into consideration every method ISPs, big tech (Google, Facebook), and governments could track you.
https://torproject.org/ for the Tor browser
https://top10vpns.com/compare for a good VPN
But what can't save your online privacy is non-ISPs like Amazon/Netflix/Google from selling your data, which was out of scope of the FCC ruling anyway. So a lot of the excitement over this ruling is overblown, when in fact, your information is likely or could be for sale elsewhere.
That does not mean it is overblown. Sure particular websites sell your traffic. That is only traffic with that particular website. This ruling is about three traffic with your ISP, which is literally all of your traffic.