In short:
run multiple Tor processes on the bridge,
ensure they have the same identity keys,
and distribute traffic across them
using a load balancer.
Getting here required hardware investment
as well as the load-balanced multiple-Tor architecture,
but the load-balanced multiple-Tor architecture
is what made it possible to use the hardware to its fullest.
Most bridges do not need this technique.
It may be useful for other indirect-access transports
like Conjure,
default obfs4 bridges that serve many users,
and maybe even exit nodes.
Hardware eventually becomes a limit anyway—the
Tor anti-censorship team has had to establish a
second Snowflake bridge.