Your university disabled SSLv3 because of vulnerabilities in the encryption called the "Poodle" attack.
The thing is: An attacker might force you to use SSLv3 by aquiring a man-in-the-middle position (which is fairly easy e.g. on a wireless network). Then, when you try to read your emails, he will downgrade your encrypted connection to the mail server to SSLv3. This communication protocol is not easily breakable, but it does have some weaknesses, one of which was discovered recently: An attacker can keep guessing some bits at the end of a network package. And it will only take him a few (~1000) guesses until he gets the whole session cookie (the one authenticating your facebook (email, ebay, amazon ...) session so you won't have to enter your password every time you reload the page or follow an internal link) right.
At that time, he will be able to hijack your facebook (email, ebay, amazon ...) account. To prevent this from happening, server administrators are removing the option to use SSLv3 entirely. Almost every device supports better encryption protocols, so it is not really necessary anymore.
If you want to check if your browser is vulnerable to the attack, there is a test page here: Poodle Test
Apparently, evolution did update their encryption to not depend on SSLv3 anymore only recently. But the evolution version in the official repositorys is pretty outdated, which means that you COULD build evolution from source, but I personally do not recommend doing it. Another way is to enable the proposed repositories and install it from there, or just wait until the new version is moved to the official repo and evolution is updated via system update.
Source:
Explanation of poodle at heise.de