If you have an (W)LAN network connected to an ADSL modem at your home, a mobile access point is like that ADSL modem; a mobile access point (AP) translates between the protocol of the mobile network to the protocol of the wider Internet. Imagine the mobile network as a LAN, and access points are the nodes in the LAN that have direct access to the Internet, all communication between the inner network and the outer network must go through an access point.
Access points can have rules about what data can pass through it, how it works is similar to how a firewall works. At a minimum, the firewall will have rules on which ports that applications can connect to. By default, HTTP uses port 80 and HTTPS uses port 443, but any protocol can use any port number as long as both the client and the server agrees on which one to use. A more aggressive firewall will also inspect the destination of a data packet, and an even more aggressive one could inspect the actual content of the packets, as long as they aren't encrypted.
The job of a proxy is to tunnel a data transmission through a remote server; so if you configured your phone to use proxy 22.214.171.124 at port 80 or 443, the firewall will have no way of distinguishing between this and normal HTTP/HTTPS connection, especially with HTTPS proxy as the data is encrypted from the client to the proxy. The remote proxy server, which is ideally located in an unrestricted network, will then relay the data to their true destination.
The network operator can block a proxy by blacklisting their IP address and configuring their firewall to block any access to the IP address of a known proxy, but since there are 4 billion IPv4 addresses and the IP addresses used by some proxies change all the time, it is difficult if not impossible task to blacklist every proxy in existence. Anyone can also create their own proxy server using their own home connection or purchase a server that they use for proxying, this makes it impossible to filter all proxies.
Most networks that blocks only for browser connections does that to limit usage of bandwidth sucking applications, like torrents; so, as long as your proxy usage doesn't burden the network too much and you're not using it to access illegal materials, they usually wouldn't hunt you down for it.