Mostly. The outgoing traffic is repeatedly encrypted too, with one layer per hop. The client adds all the layers of encryption, and then each relay in the circuit peels off one layer as it processes the cells.
Iād also recommend reading the Anonymous Routing chapter of Defend Dissent book.
You will find a long explanation about Tor and other cool visualizations like this one: