levgeni gave a pretty good answer; there are a few points I thought I could add:
I'm now trying to design a more secure key-change algorithm to replace widely used DH.
First off, it is quite likely that your new "key-exchange algorithm" is weak. I don't say that only to be mean [1], but also based on the history of proposed cryptographical algorithms (including key exchange) - most of them have turned out to be weak, and this is especially true of designs made by cryptographical novices. And, even when an experienced cryptographer proposes a new system, they will never claim it to be secure [2] - we always say that it needs vetting.
The other issue is that we're about to replace (or supplement) DH (and ECDH) anyways. The reason for this is because of the upcoming threat of Cryptographically Relevant Quantum Computers - if someone were able to build one, then they could break DH and ECDH. And, while we don't believe anyone has one now, they might in 10 or 20 years - and once someone has one, they could go back and start breaking recorded sessions (which would include the DH/ECDH exchange) - hence, we're working on this problem now.
So, unless your algorithm is Quantum Resistant, that is, cannot be broken even with an attacker with a Quantum Computer, well, it's unlikely that anyone would pay attention to it, even if you could show that it is secure against adversaries with only conventional computers. And, one way to see that an algorithm is not Quantum Resistant" is to consider an adversary with a Magic Box that can factor and compute discrete logs - if such an adversary can break your system, then you're not Quantum Resistant. Of course, it doesn't go the other way around - just because your algorithm is immune to factoring and computing discrete logs attacks doesn't mean it is Quantum Resistant - Quantum Computers can do other things too.
However, I am only able to prove that my algorithm is more secure logically, which means I can only prove it from a reasoning rather than mathematical perspective.
What you mean is that you have a plausibility argument that your algorithm is secure. A plausibility argument is better than nothing; however it is not a great deal better. A mathematical proof is what is expected...
Thus I wonder if there is a standardized procedure that I can use to evaluate my work.
As levgeni stated, the standard way is to identify the 'hard problem' (or possibly several hard problems), and then generate a proof that if you can break your key exchange [3], then he can solve the hard problem [4]. Once you've done that, you can try to evaluate how hard your 'hard problem' is (and whether it is harder than the hard problem that DH is based on, which would be either the CDH or the DDH problem).
Unless you've done that, it's be extremely hard to get anyone to take your work seriously.
Of course, even if you've done that (and yes, that's a lot of work), it'll still be an uphill struggle - you still need to get cryptanalysts to look at it. If you have everything written up, you could put it on eprint (and so it'd be out there); you could also submit it to a conference (if it's novel and postquantum, PQC https://pqcrypto.org/conferences.html might be your best bet) - even if the paper isn't accepted, the reviews you get may be enlightening.
[1]: Well, that's not the only reason...
[2]: The one exception would be if he has a proof in hand that the strength of the system can be reduced to an accepted hard problem. However, even in those cases, he is likely to recommend that someone go through the proof thoroughly...
[3]: Ideally, breaking it means "if you can give the attacker the exchanged key shares and a putative 'shared secret', he has an advantage of distinguishing whether that 'shared secret' is the actual value, or a random value drawn from an appropriate random distribution"
[4]: Note the order - breaking your system implies breaking the hard problem. I've seen papers that tried to go in the other direction - "if you can solve this hard problem, you can break my system" - that doesn't actually show anything.