*** It appears that when I searched your config listing, I fat-fingered the search term and that's why I wasn't seeing that you have in fact used the ACLs...but since you ask, I'll describe this anyway***
It begins with WHERE you want to apply the ACL. (note: this is a common theme when using WiNG-5. You create things like ACL policies, DHCP server policies, WLANs, etc - but then you have to select where you want them to be used - Example, you create WLANs...but then you have to indicated that you want to use one in the AP's Profile. Same thing with the ACL's you create)
With ACLs, where you indicate that it should be used depends on how you constructed the ACL. In your case, it appears that you have ACLs created to control traffic originating at the wireless clients when attempting to reach somewhere after the AP, right?
In this case, the best way to do this is to create an ACL based on the understanding that you want to control that traffic when it comes in to the AP radio - from the wireless user. So you create your rules. Once you have that ACL, you then want to apply it to the applicable WLAN (so this is applied in the actual WLAN configuration). Here's what one of yours looks like:
wlan 5
description Guest Network
ssid ABC_Visitor
vlan 100
bridging-mode tunnel
encryption-type tkip-ccmp
authentication-type none
wpa-wpa2 psk 0 Visitor@xxx
use ip-access-list in ABCEmployee2018
Notice the last line there. The 'use' syntax is how you will normally specify that a device (controller, AP) should actually use something that you created. In this case, you've specified that the WLAN setup should 'use' the ip-access-list name "ABCEmployee2018" and apply those rules to traffic coming from wireless users and entering the AP. That's where the rules will then be processed.
You can also create ACLs and then apply them to Ethernet interfaces on APs or controllers. Just FYI.