You didn't show actual config ...
But anyway. If you set port like this:
/interface bridge port
add bridge=... interface=etherX frame-types=admit-only-vlan-tagged ingress-filtering=yes
/interface bridge vlan
add bridge=... vlan-ids=100 tagged=etherX,...
add bridge=... vlan-ids=200 tagged=etherX,...
then (implicitly set) PVID=1 won't have any effect and all untagged frames will be dropped on ingress. If ingress-filtering was not set, then frames tagged with any VID would be allowed on ingress. With property set as in example, bridge consults egress table and drops frames, tagged with VIDs other than 100 or 200. So this is a security feature, it blocks attempts to inject frames with invalid VIDs.
If port is not set as member of a VLAN (either tagged or untagged), then frame tagged with such VID won't be allowed through that port on egress. If port is set as untagged member, VLAN tag will be stripped on egress.
VLAN-related settings under
/interface bridge port are about ingress behaviour. Settings under
/interface bridge vlan are about egress behaviour. This barrier is only "broken" if ingress-filtering is set to yes (as explained earlier).
It is possible to configure a port as untagged on egress for multiple VIDs ... but port can only have single PVID set on ingress.
It is always good to check ouput of command
/interface bridge vlan print ... which shows actual running values ... including (implicit) default settings of PVID ... this way one can verify that PVID setting doesn't have effect if frame-types is set to accept only tagged frames. If port is set as untagged member of a VLAN explicitly, then setting frame types to tagged only doesn't remove port from the list.