Because instead of having an all-powerful account (which we so lovingly know as root), you can separate specific roles to different accounts. To use Windows' ACLs as an example:
- Adjust memory quotas for a process
- Allow/deny access to this computer from the network
- Backup files and directories
- Bypass traverse checking
- Change system time
- Increase scheduling priority
- Load and unload device drivers
- Manage auditing and security logs
- Restore files and directories
- Shutdown the system
- Take ownership of files or other objects
As you can see, those are finely-grained controls. Why would these be useful on Linux? Because you can have a root account which can bind Apache to a port <1024, and even if it is compromised it cannot "shutdown the system," or "deny access to this computer from the network," thus the attacker will be able to cause minimal damage. Yes, the same can be done on Linux using SELinux, AppArmor, or some other ACL system, but again - those aren't part of the kernel. They are extra apps, and adding layers is not always the best solution when it comes to security.
Um.. Forgive me for a second, but are you suggesting that a Linux system running a service(s) under full root privileges (such as Apache) is just as secure as a Linux system running the same process but with compartmentalisation to make sure that each service has access to just the files and directories it needs, achieved (currently) via AppArmor, SELinux, or a similar ACL system?