So if we go by the last point in ircmaxell's answer, you could technically pass the full hashed string into Laravel's Crypt class, and store that.
http://laravel.com/docs/4.2/security#encryption
$encryptedHash = Crypt::encrypt(Hash::make($password));
Of course, that means all encrypted hashes will be encrypted using the same encryption key. If the key is discovered, then all of the encrypted hashes can be decrypted at once.
But my question is if the database is breached, does having 50,000+ strings all encrypted with the same key, make it easier to determine what the key is? Generally you'd only encrypt transient messages with the same key, or use unique keys per message. I'd be concerned if someone had a big data set that they know (or assume) is encrypted using the same key.
EDIT: Just did a little research, and apparently re-using the same key on N number of messages does not make the key more vulnerable to discovery, even if the messages are all identical (which hashed passwords won't be).
So it should be safe to apply Laravel's Crypt::encrypt() to the output of Hash::make() before storage.